Moving your Microsoft environment to zero trust

Zero trust is a concept that’s easy to grasp but incredibly difficult to implement. It touches almost every system, component, application, and resource within an enterprise, and requires a strategic framework and specific tools and technologies to achieve best practice results. As organizations move Microsoft environments towards zero trust, it’s vital to ensure that all […]

Continue Reading

Balance reliable online age verification methods with data protection issues

Recently, California passed the California Age-Appropriate Design Code Act (CAADCA), a bill designed to protect children online. Although the bill has presented notable concerns regarding privacy and other practical challenges, we’ve reached an inflection point where children roaming freely on the web should no longer be tolerated. In this Help Net Security video, Philipp Pointner, […]

Continue Reading

2FA, 3FA, MFA… What does it all mean?

Simply put, authentication is the act of proving you are who you say you are. To gain access to protected information, systems or locations, the user must prove their identity by providing specific access credentials. The system asks: “Who are you? Prove it.” When the user successfully authenticates (and depending on the permissions associated with […]

Continue Reading

Passwordless will overtake other methods to secure employee identities

Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more than 1,000 employees, to learn more about the different methods to secure employee identities, the state of workforce passwordless authentication and multi-factor authentication (MFA) usage. This Help Net Security video showcases how […]

Continue Reading

The future of MFA is passwordless

Secret Double Octopus and Dimensional Research surveyed over 300 IT professionals with responsibility for workforce identities and their security at organizations with more than 1,000 employees, in order to learn more about the state of workforce passwordless authentication and multi-factor authentication (MFA) usage. Into the future with enterprise passwordless solutions The survey isolated perceptions and […]

Continue Reading

2FA is over. Long live 3FA!

In the past few months, we’ve seen an unprecedented number of identity theft attacks targeting accounts protected by two-factor authentication (2FA), challenging the perception that existing 2FA solutions provide adequate protection against identity theft attacks. The recent Uber breach is just one example, but we see many campaigns circumventing 2FA on various platforms. For over […]

Continue Reading

API authentication failures demonstrate the need for zero trust

The use of application programming interfaces (APIs) has exploded as businesses deploy mobile apps, containers, serverless computing, microservices, and expand their cloud presence. Consequently, many APIs are developed and deployed very quickly, leading to the persistence of coding errors, with poor authentication practices numbering among the top offenses. APIs are stateless in nature, and any […]

Continue Reading

Strong Authentication Considerations for Digital, Cloud-First Businesses

Authentication as a baseline security control is essential for organizations to know who and what is accessing corporate resources and assets.  The Cybersecurity and Infrastructure Security Agency (CISA) states that authentication is the process of verifying that a user’s identity is genuine. In this climate of advanced cyber threats and motivated cyber criminals, organizations need […]

Continue Reading